IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CBFCFBFBFB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CBFCFBFBFB.exe_dc97fc91233dc875f6b4e4fb767c1c44d31d15cc_45f160d2_cebbf0a7-e1d0-4076-98e3-b5c971e63e95\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_6d926f6c9da85a293d58c3cb45a16c531c4372_bfb0bb6b_780bf0d2-10e6-4629-ae6d-e52283072cc2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q4M8ZOMH\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\JJDBAEHIJKJK\BAECFC
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\ProgramData\JJDBAEHIJKJK\BFCGDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\JJDBAEHIJKJK\BGDGHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJDBAEHIJKJK\DAAECA
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\JJDBAEHIJKJK\DBKKFC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JJDBAEHIJKJK\DBKKFC-shm
data
dropped
C:\ProgramData\JJDBAEHIJKJK\EBGDHJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJDBAEHIJKJK\FIDHIE
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJDBAEHIJKJK\GCFBAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JJDBAEHIJKJK\GIJEGD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJDBAEHIJKJK\GIJEGD-shm
data
dropped
C:\ProgramData\JJDBAEHIJKJK\HCAEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJDBAEHIJKJK\IIJJDG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER48BE.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 13:14:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4999.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A75.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E06.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 13:15:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E46.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5EA4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
EBCDIC text, with very long lines (65536), with no line terminators, with overstriking
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\CBFCFBFBFB.exe
"C:\ProgramData\CBFCFBFBFB.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 308
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 320
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JJDBAEHIJKJK" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://49.12.197.9/
49.12.197.9
malicious
https://advocachark.store/api
172.67.166.76
malicious
abnomalrkmu.site
malicious
https://49.12.197.9/freebl3.dll
49.12.197.9
malicious
https://49.12.197.9/sqlp.dll
49.12.197.9
malicious
https://49.12.197.9/softokn3.dll
49.12.197.9
malicious
absorptioniw.site
malicious
treatynreit.site
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
questionsmw.stor
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://49.12.197.9/vcruntime140.dll
49.12.197.9
malicious
https://49.12.197.9/nss3.dll
49.12.197.9
malicious
https://49.12.197.9/mozglue.dll
49.12.197.9
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://advocachark.store/api;$~(9
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cowod.hopto.CAEBAK
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://49.12.197.9/nss3.dllrsg47
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
https://49.12.197.9//w
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
http://playd.healthnlife.pk/ldms/a43486128347.exeJ
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://advocachark.store/Ri
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://advocachark.store/api;
unknown
https://49.12.197.9
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=HeLxjRDbQrcV&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://cowod.hopto.
unknown
http://playd.healthnlife.pk/ldms/a43486128347.exe
147.45.44.104
http://cowod.hoptoGCAEBAK
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
http://cowod.hopto
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=2ZRoxzol
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
http://playd.healthnlife.pk/ldms/a43486128347.exej
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://store.ste
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=fWwP
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
http://cowod.hoptoAAKJDAK
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://advocachark.store:443/api
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://49.12.197.9ECAAFH
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://steamcommunity.com/profiles/76561199780418869f
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
http://playd.healthnlife.pk/ldms/a43486128347.exeorm-data;
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://cowod.hopto.orgDAAEC--tent-Disposition:
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://advocachark.store/1$~
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steambroadcast.akamaized.n
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://49.12.197.9/vcruntime140.dllU
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
advocachark.store
172.67.166.76
malicious
treatynreit.site
unknown
malicious
mysterisop.site
unknown
malicious
chorusarorp.site
unknown
malicious
snarlypagowo.site
unknown
malicious
absorptioniw.site
unknown
malicious
abnomalrkmu.site
unknown
malicious
soldiefieop.site
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
playd.healthnlife.pk
147.45.44.104
fp2e7a.wpc.phicdn.net
192.229.221.95
241.42.69.40.in-addr.arpa
unknown
questionsmw.store
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
49.12.197.9
unknown
Germany
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.166.76
advocachark.store
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
147.45.44.104
playd.healthnlife.pk
Russian Federation

Registry

Path
Value
Malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
ProgramId
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
FileId
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
LowerCaseLongPath
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
LongPathHash
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Name
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
OriginalFileName
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Publisher
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Version
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
BinFileVersion
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
BinaryType
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
ProductName
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
ProductVersion
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
LinkDate
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
BinProductVersion
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
AppxPackageFullName
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
AppxPackageRelativeId
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Size
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Language
malicious
\REGISTRY\A\{4a139eaa-04aa-e2ff-473c-a2819de88c7c}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
ProgramId
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
FileId
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
LowerCaseLongPath
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
LongPathHash
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
Name
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
OriginalFileName
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
Publisher
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
Version
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
BinFileVersion
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
BinaryType
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
ProductName
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
ProductVersion
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
LinkDate
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
BinProductVersion
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
AppxPackageFullName
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
AppxPackageRelativeId
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
Size
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
Language
\REGISTRY\A\{10e0ec7b-d32a-4a7d-024d-768b5ae72e5e}\Root\InventoryApplicationFile\cbfcfbfbfb.exe|c9d9f31e3f9092c
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
638000
unkown
page read and write
malicious
B18000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
E55000
heap
page read and write
malicious
D6F000
stack
page read and write
2FAE000
stack
page read and write
1FE1F000
direct allocation
page readonly
12FC000
stack
page read and write
699000
unkown
page read and write
7D9E000
stack
page read and write
125ED000
stack
page read and write
6CAFF000
unkown
page write copy
AF9000
stack
page read and write
FF0000
heap
page read and write
14B6D000
stack
page read and write
1318000
heap
page read and write
7FC000
stack
page read and write
1722C000
stack
page read and write
6C880000
unkown
page readonly
563000
remote allocation
page execute and read and write
D7E000
heap
page read and write
463000
remote allocation
page execute and read and write
3823A000
heap
page read and write
2C352000
heap
page read and write
467000
remote allocation
page execute and read and write
132C000
heap
page read and write
1351000
heap
page read and write
14CAF000
stack
page read and write
2F2D000
stack
page read and write
AED000
stack
page read and write
19B90000
heap
page read and write
98E000
stack
page read and write
4C7EC000
stack
page read and write
B7A000
heap
page read and write
1988C000
heap
page read and write
46B000
remote allocation
page execute and read and write
5A1000
remote allocation
page execute and read and write
CFE000
stack
page read and write
FAD000
heap
page read and write
B7E000
heap
page read and write
6FC000
stack
page read and write
D76000
heap
page read and write
203AB000
stack
page read and write
11B0000
heap
page read and write
670000
remote allocation
page execute and read and write
30AF000
stack
page read and write
69B000
unkown
page readonly
1FE28000
direct allocation
page readonly
1360000
heap
page read and write
19810000
heap
page read and write
1FE52000
direct allocation
page read and write
6C881000
unkown
page execute read
2A5C000
stack
page read and write
E2B000
heap
page read and write
197FF000
stack
page read and write
1FE71000
heap
page read and write
122D000
heap
page read and write
2E2D000
stack
page read and write
610000
unkown
page readonly
1FC10000
direct allocation
page execute and read and write
FB5000
heap
page read and write
1310000
heap
page read and write
611000
unkown
page execute read
940000
heap
page read and write
1366000
heap
page read and write
9B70000
unclassified section
page read and write
1430000
heap
page read and write
164F000
stack
page read and write
B0E000
unkown
page readonly
19EB0000
heap
page read and write
1FE1D000
direct allocation
page execute read
DE0000
heap
page read and write
B70000
heap
page read and write
120E000
stack
page read and write
121A000
heap
page read and write
1435000
heap
page read and write
CB0000
heap
page read and write
13A8000
heap
page read and write
2047C000
heap
page read and write
3E1AE000
heap
page read and write
6CB05000
unkown
page readonly
14BAE000
stack
page read and write
FE0000
heap
page read and write
105C000
stack
page read and write
19901000
heap
page read and write
1996B000
stack
page read and write
45E000
remote allocation
page execute and read and write
B73000
unkown
page readonly
6C920000
unkown
page readonly
1989D000
heap
page read and write
DE8000
heap
page read and write
9A80000
heap
page read and write
2C7E000
stack
page read and write
322C9000
heap
page read and write
356D000
stack
page read and write
19AA4000
heap
page read and write
AF1000
unkown
page execute read
F14000
heap
page read and write
B18000
unkown
page write copy
2CC0000
heap
page read and write
1382000
heap
page read and write
AFD000
stack
page read and write
1006F000
stack
page read and write
100AE000
stack
page read and write
31ED000
stack
page read and write
19DE9000
heap
page read and write
19CA9000
heap
page read and write
2C3E000
stack
page read and write
55A000
remote allocation
page execute and read and write
19820000
heap
page read and write
6C912000
unkown
page readonly
13B9000
heap
page read and write
55D000
remote allocation
page execute and read and write
DBE000
stack
page read and write
1983B000
heap
page read and write
698000
unkown
page execute and read and write
638000
unkown
page write copy
B60000
heap
page read and write
101E000
heap
page read and write
19CA2000
heap
page read and write
7FD000
stack
page read and write
F7C000
stack
page read and write
611000
unkown
page execute read
1262D000
stack
page read and write
2A9C000
stack
page read and write
172BE000
stack
page read and write
2BE0000
heap
page read and write
1FC11000
direct allocation
page execute read
6CABF000
unkown
page readonly
2CBE000
stack
page read and write
263E4000
heap
page read and write
6CAFE000
unkown
page read and write
19E07000
heap
page read and write
C7D000
stack
page read and write
A10000
heap
page read and write
585E000
stack
page read and write
2F60000
heap
page read and write
AF1000
unkown
page execute read
C80000
heap
page read and write
4700000
heap
page read and write
9A70000
heap
page read and write
6C8FD000
unkown
page readonly
B73000
unkown
page readonly
AF0000
unkown
page readonly
11C0000
heap
page read and write
1210000
heap
page read and write
1984D000
heap
page read and write
163F000
stack
page read and write
4CA2D000
stack
page read and write
1FC18000
direct allocation
page execute read
D30000
heap
page read and write
121E000
heap
page read and write
69B000
unkown
page readonly
1373000
heap
page read and write
4664F000
stack
page read and write
1982B000
heap
page read and write
B71000
unkown
page read and write
133C000
heap
page read and write
36DE000
stack
page read and write
37DF000
stack
page read and write
153E000
stack
page read and write
582000
remote allocation
page execute and read and write
13CA000
heap
page read and write
2DFF000
stack
page read and write
B70000
unkown
page execute and read and write
9CE000
stack
page read and write
E47000
heap
page read and write
6CB00000
unkown
page read and write
6C921000
unkown
page execute read
62E000
unkown
page readonly
B0E000
unkown
page readonly
30ED000
stack
page read and write
19EAE000
heap
page read and write
9AB7000
heap
page read and write
400000
remote allocation
page execute and read and write
134E000
stack
page read and write
B1E000
stack
page read and write
4C6EB000
stack
page read and write
62E000
unkown
page readonly
366D000
stack
page read and write
19A6A000
stack
page read and write
115C000
stack
page read and write
154E000
stack
page read and write
1FE5F000
direct allocation
page readonly
1FD76000
direct allocation
page execute read
2CC8000
heap
page read and write
1FE5A000
direct allocation
page readonly
610000
unkown
page readonly
14CEB000
stack
page read and write
19B8E000
stack
page read and write
1410000
heap
page read and write
19BAA000
heap
page read and write
D70000
heap
page read and write
1FE5D000
direct allocation
page readonly
6C90E000
unkown
page read and write
860000
heap
page read and write
AF0000
unkown
page readonly
2B00000
heap
page read and write
19895000
heap
page read and write
2BF0000
heap
page read and write
63A000
remote allocation
page execute and read and write
There are 191 hidden memdumps, click here to show them.